mbox series

[v16,00/68] ceph+fscrypt: full support

Message ID 20230227032813.337906-1-xiubli@redhat.com
Headers show
Series ceph+fscrypt: full support | expand

Message

Xiubo Li Feb. 27, 2023, 3:27 a.m. UTC
From: Xiubo Li <xiubli@redhat.com>

This patch series is based on Jeff Layton's previous great work and effort
on this.

Since v15 we have added the ceph qa teuthology test cases for this [1][2],
which will test both the file name and contents encryption features and at
the same time they will also test the IO benchmarks.

To support the fscrypt we also have some other work in ceph [3][4][5][6][7][8]:

[1] https://github.com/ceph/ceph/pull/48628
[2] https://github.com/ceph/ceph/pull/49934
[3] https://github.com/ceph/ceph/pull/43588
[4] https://github.com/ceph/ceph/pull/37297
[5] https://github.com/ceph/ceph/pull/45192
[6] https://github.com/ceph/ceph/pull/45312
[7] https://github.com/ceph/ceph/pull/40828
[8] https://github.com/ceph/ceph/pull/45224
[9] https://github.com/ceph/ceph/pull/45073

The [8] and [9] are still undering testing and will soon be merged after
that. All the others had been merged long time ago.

The main changes since v15:

- rebased onto v6.2

- some minor cleanups and revises reported by:
  kernel test robot <lkp@intel.com>
  Milind Changire <mchangir@redhat.com>
  Ilya Dryomov <idryomov@gmail.com>

- Luis' fixes:
  ceph: mark directory as non-complete complete after loading key
  ceph: fix memory leak in mount error path when using test_dummy_encryption
  ceph: allow encrypting a directory while not having Ax caps

  NOTE: the second one has been folded into a previous commit.

- fixed a sequence bug to make sure the osd req->r_callback()s are
  called before removing the reqs from the osdc, which will cause
  a warning in fscrypt_destroy_keyring() and potential use-after-free
  crash bugs in other places.




Jeff Layton (47):
  libceph: add spinlock around osd->o_requests
  libceph: define struct ceph_sparse_extent and add some helpers
  libceph: add sparse read support to msgr2 crc state machine
  libceph: add sparse read support to OSD client
  libceph: support sparse reads on msgr2 secure codepath
  libceph: add sparse read support to msgr1
  ceph: add new mount option to enable sparse reads
  ceph: preallocate inode for ops that may create one
  ceph: make ceph_msdc_build_path use ref-walk
  libceph: add new iov_iter-based ceph_msg_data_type and
    ceph_osd_data_type
  ceph: use osd_req_op_extent_osd_iter for netfs reads
  ceph: fscrypt_auth handling for ceph
  ceph: ensure that we accept a new context from MDS for new inodes
  ceph: add support for fscrypt_auth/fscrypt_file to cap messages
  ceph: implement -o test_dummy_encryption mount option
  ceph: decode alternate_name in lease info
  ceph: add fscrypt ioctls
  ceph: add encrypted fname handling to ceph_mdsc_build_path
  ceph: send altname in MClientRequest
  ceph: encode encrypted name in dentry release
  ceph: properly set DCACHE_NOKEY_NAME flag in lookup
  ceph: set DCACHE_NOKEY_NAME in atomic open
  ceph: make d_revalidate call fscrypt revalidator for encrypted
    dentries
  ceph: add helpers for converting names for userland presentation
  ceph: add fscrypt support to ceph_fill_trace
  ceph: create symlinks with encrypted and base64-encoded targets
  ceph: make ceph_get_name decrypt filenames
  ceph: add a new ceph.fscrypt.auth vxattr
  ceph: add some fscrypt guardrails
  libceph: add CEPH_OSD_OP_ASSERT_VER support
  ceph: size handling for encrypted inodes in cap updates
  ceph: fscrypt_file field handling in MClientRequest messages
  ceph: handle fscrypt fields in cap messages from MDS
  ceph: update WARN_ON message to pr_warn
  ceph: add infrastructure for file encryption and decryption
  libceph: allow ceph_osdc_new_request to accept a multi-op read
  ceph: disable fallocate for encrypted inodes
  ceph: disable copy offload on encrypted inodes
  ceph: don't use special DIO path for encrypted inodes
  ceph: align data in pages in ceph_sync_write
  ceph: add read/modify/write to ceph_sync_write
  ceph: plumb in decryption during sync reads
  ceph: add fscrypt decryption support to ceph_netfs_issue_op
  ceph: set i_blkbits to crypto block size for encrypted inodes
  ceph: add encryption support to writepage
  ceph: fscrypt support for writepages
  ceph: report STATX_ATTR_ENCRYPTED on encrypted inodes

Luís Henriques (9):
  ceph: add base64 endcoding routines for encrypted names
  ceph: allow encrypting a directory while not having Ax caps
  ceph: mark directory as non-complete after loading key
  ceph: don't allow changing layout on encrypted files/directories
  ceph: invalidate pages when doing direct/sync writes
  ceph: add support for encrypted snapshot names
  ceph: add support for handling encrypted snapshot names
  ceph: update documentation regarding snapshot naming limitations
  ceph: prevent snapshots to be created in encrypted locked directories

Xiubo Li (12):
  ceph: make the ioctl cmd more readable in debug log
  ceph: fix base64 encoded name's length check in ceph_fname_to_usr()
  ceph: pass the request to parse_reply_info_readdir()
  ceph: add ceph_encode_encrypted_dname() helper
  ceph: add support to readdir for encrypted filenames
  ceph: get file size from fscrypt_file when present in inode traces
  ceph: add __ceph_get_caps helper support
  ceph: add __ceph_sync_read helper support
  ceph: add object version support for sync read
  ceph: add truncate size handling support for fscrypt
  libceph: defer removing the req from osdc just after req->r_callback
  ceph: drop the messages from MDS when unmounting

 Documentation/filesystems/ceph.rst |  10 +
 fs/ceph/Makefile                   |   1 +
 fs/ceph/acl.c                      |   4 +-
 fs/ceph/addr.c                     | 182 ++++++--
 fs/ceph/caps.c                     | 222 ++++++++--
 fs/ceph/crypto.c                   | 669 +++++++++++++++++++++++++++++
 fs/ceph/crypto.h                   | 270 ++++++++++++
 fs/ceph/dir.c                      | 187 ++++++--
 fs/ceph/export.c                   |  44 +-
 fs/ceph/file.c                     | 595 +++++++++++++++++++++----
 fs/ceph/inode.c                    | 580 +++++++++++++++++++++++--
 fs/ceph/ioctl.c                    | 126 +++++-
 fs/ceph/mds_client.c               | 477 +++++++++++++++++---
 fs/ceph/mds_client.h               |  29 +-
 fs/ceph/quota.c                    |   4 +
 fs/ceph/snap.c                     |   6 +
 fs/ceph/super.c                    | 169 +++++++-
 fs/ceph/super.h                    |  44 +-
 fs/ceph/xattr.c                    |  29 ++
 include/linux/ceph/ceph_fs.h       |  21 +-
 include/linux/ceph/messenger.h     |  40 ++
 include/linux/ceph/osd_client.h    |  93 +++-
 include/linux/ceph/rados.h         |   4 +
 net/ceph/messenger.c               |  79 ++++
 net/ceph/messenger_v1.c            |  98 ++++-
 net/ceph/messenger_v2.c            | 286 +++++++++++-
 net/ceph/osd_client.c              | 369 +++++++++++++++-
 27 files changed, 4243 insertions(+), 395 deletions(-)
 create mode 100644 fs/ceph/crypto.c
 create mode 100644 fs/ceph/crypto.h

Comments

Luis Henriques Feb. 27, 2023, 9:27 a.m. UTC | #1
xiubli@redhat.com writes:

> From: Xiubo Li <xiubli@redhat.com>
>
> This patch series is based on Jeff Layton's previous great work and effort
> on this.
>
> Since v15 we have added the ceph qa teuthology test cases for this [1][2],
> which will test both the file name and contents encryption features and at
> the same time they will also test the IO benchmarks.
>
> To support the fscrypt we also have some other work in ceph [3][4][5][6][7][8]:
>
> [1] https://github.com/ceph/ceph/pull/48628
> [2] https://github.com/ceph/ceph/pull/49934
> [3] https://github.com/ceph/ceph/pull/43588
> [4] https://github.com/ceph/ceph/pull/37297
> [5] https://github.com/ceph/ceph/pull/45192
> [6] https://github.com/ceph/ceph/pull/45312
> [7] https://github.com/ceph/ceph/pull/40828
> [8] https://github.com/ceph/ceph/pull/45224
> [9] https://github.com/ceph/ceph/pull/45073
>
> The [8] and [9] are still undering testing and will soon be merged after
> that. All the others had been merged long time ago.

Thanks a lot for your work on this, Xiubo (and Jeff!).  I assume this set
is what's on the 'testing' branch.  I've done some testing on that branch
recently, but I'll start having another look at v16 and run some more
tests.

Am I right assuming that this v16 patchset means we are NOT getting this
merged into 6.3?

Cheers,
Xiubo Li Feb. 27, 2023, 9:58 a.m. UTC | #2
Hi Luis,

On 27/02/2023 17:27, Luís Henriques wrote:
> xiubli@redhat.com writes:
>
>> From: Xiubo Li <xiubli@redhat.com>
>>
>> This patch series is based on Jeff Layton's previous great work and effort
>> on this.
>>
>> Since v15 we have added the ceph qa teuthology test cases for this [1][2],
>> which will test both the file name and contents encryption features and at
>> the same time they will also test the IO benchmarks.
>>
>> To support the fscrypt we also have some other work in ceph [3][4][5][6][7][8]:
>>
>> [1] https://github.com/ceph/ceph/pull/48628
>> [2] https://github.com/ceph/ceph/pull/49934
>> [3] https://github.com/ceph/ceph/pull/43588
>> [4] https://github.com/ceph/ceph/pull/37297
>> [5] https://github.com/ceph/ceph/pull/45192
>> [6] https://github.com/ceph/ceph/pull/45312
>> [7] https://github.com/ceph/ceph/pull/40828
>> [8] https://github.com/ceph/ceph/pull/45224
>> [9] https://github.com/ceph/ceph/pull/45073
>>
>> The [8] and [9] are still undering testing and will soon be merged after
>> that. All the others had been merged long time ago.
> Thanks a lot for your work on this, Xiubo (and Jeff!).  I assume this set
> is what's on the 'testing' branch.  I've done some testing on that branch
> recently, but I'll start having another look at v16 and run some more
> tests.

Yeah, this full fscrypt patch series has been in the 'testing' branch 2 
months ago as we discussed in the IRC. After that I just appended the 
following two commits:


   libceph: defer removing the req from osdc just after req->r_callback
   ceph: drop the messages from MDS when unmounting


And also 2 small other minor fixes in the commit comments and folded the 
following double free fixing patch reported by Ilya:

https://patchwork.kernel.org/project/ceph-devel/patch/20230111011403.570964-1-xiubli@redhat.com/


> Am I right assuming that this v16 patchset means we are NOT getting this
> merged into 6.3?

Yeah, not get merged yet. Because we were never able to put this to test 
since we had lots of infra issues with teuthology in last 2 months.

Since the teuthology Labs are back to work now we are running the tests 
and after that the patches will be ready.

Thanks

- Xiubo


>
> Cheers,
Luis Henriques Feb. 27, 2023, 10:30 a.m. UTC | #3
Xiubo Li <xiubli@redhat.com> writes:

> Hi Luis,
>
> On 27/02/2023 17:27, Luís Henriques wrote:
>> xiubli@redhat.com writes:
>>
>>> From: Xiubo Li <xiubli@redhat.com>
>>>
>>> This patch series is based on Jeff Layton's previous great work and effort
>>> on this.
>>>
>>> Since v15 we have added the ceph qa teuthology test cases for this [1][2],
>>> which will test both the file name and contents encryption features and at
>>> the same time they will also test the IO benchmarks.
>>>
>>> To support the fscrypt we also have some other work in ceph [3][4][5][6][7][8]:
>>>
>>> [1] https://github.com/ceph/ceph/pull/48628
>>> [2] https://github.com/ceph/ceph/pull/49934
>>> [3] https://github.com/ceph/ceph/pull/43588
>>> [4] https://github.com/ceph/ceph/pull/37297
>>> [5] https://github.com/ceph/ceph/pull/45192
>>> [6] https://github.com/ceph/ceph/pull/45312
>>> [7] https://github.com/ceph/ceph/pull/40828
>>> [8] https://github.com/ceph/ceph/pull/45224
>>> [9] https://github.com/ceph/ceph/pull/45073
>>>
>>> The [8] and [9] are still undering testing and will soon be merged after
>>> that. All the others had been merged long time ago.
>> Thanks a lot for your work on this, Xiubo (and Jeff!).  I assume this set
>> is what's on the 'testing' branch.  I've done some testing on that branch
>> recently, but I'll start having another look at v16 and run some more
>> tests.
>
> Yeah, this full fscrypt patch series has been in the 'testing' branch 2 months
> ago as we discussed in the IRC. After that I just appended the following two
> commits:
>
>
>   libceph: defer removing the req from osdc just after req->r_callback
>   ceph: drop the messages from MDS when unmounting
>
>
> And also 2 small other minor fixes in the commit comments and folded the
> following double free fixing patch reported by Ilya:
>
> https://patchwork.kernel.org/project/ceph-devel/patch/20230111011403.570964-1-xiubli@redhat.com/

Awesome, thanks for confirming.  Just wanted to make sure there wasn't
anything new in this set.

>> Am I right assuming that this v16 patchset means we are NOT getting this
>> merged into 6.3?
>
> Yeah, not get merged yet. Because we were never able to put this to test since
> we had lots of infra issues with teuthology in last 2 months.
>
> Since the teuthology Labs are back to work now we are running the tests and
> after that the patches will be ready.

Yeah, I saw these infrastructure issues and all the trouble it has been
causing.  Hopefully everything will be fine for the next merge window.

Again, thanks for the update!

Cheers